PyPI: mem0ai

CVE-2026-7597

Safety vulnerability ID: SFTY-20260502-70717

Safety legacy ID: pyup.io-98052

Affected versions of the mem0ai package are vulnerable to Deserialization of Untrusted Data due to the use of pickle.load and pickle.dump for serialising and deserialising vector store state. The faiss.py module within mem0/vector_stores/ reads serialised data using Python's pickle module without validating the source or integrity of the data, making it susceptible to arbitrary object injection through crafted pickle payloads. An authenticated remote attacker who can influence the serialised FAISS index data can supply a malicious pickle payload, resulting in arbitrary code execution within the context of the mem0ai process.

Created at: May 18, 2026Updated at: May 18, 2026

Overview

mem0ai mem0 has an Improper Input Validation Issue

Advisory

Affected versions of the mem0ai package are vulnerable to Deserialization of Untrusted Data due to the use of pickle.load and pickle.dump for serialising and deserialising vector store state. The faiss.py module within mem0/vector_stores/ reads serialised data using Python's pickle module without validating the source or integrity of the data, making it susceptible to arbitrary object injection through crafted pickle payloads. An authenticated remote attacker who can influence the serialised FAISS index data can supply a malicious pickle payload, resulting in arbitrary code execution within the context of the mem0ai process.

Affected Package

Affecting mem0ai package, versions
<2.0.0b2

Also affects

---

How to Fix

Upgrade
mem0ai
to
2.0.0b2
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more